Lucene search

K
cve[email protected]CVE-2012-3137
HistorySep 21, 2012 - 11:55 p.m.

CVE-2012-3137

2012-09-2123:55:01
CWE-287
web.nvd.nist.gov
51
2
oracle
database
server
authentication
protocol
vulnerability
cve-2012-3137
nvd

9.1 High

AI Score

Confidence

High

6.4 Medium

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:P/A:N

0.055 Low

EPSS

Percentile

93.2%

The authentication protocol in Oracle Database Server 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, 11.2.0.2, and 11.2.0.3 allows remote attackers to obtain the session key and salt for arbitrary users, which leaks information about the cryptographic hash and makes it easier to conduct brute force password guessing attacks, aka “stealth password cracking vulnerability.”

Affected configurations

NVD
Node
oracledatabase_serverMatch10.2.0.3
OR
oracledatabase_serverMatch10.2.0.4
OR
oracledatabase_serverMatch10.2.0.5
OR
oracledatabase_serverMatch11.1.0.7
OR
oracledatabase_serverMatch11.2.0.2
OR
oracledatabase_serverMatch11.2.0.3
Node
oracleprimavera_p6_enterprise_project_portfolio_managementMatch8.2
OR
oracleprimavera_p6_enterprise_project_portfolio_managementMatch8.3
OR
oracleprimavera_p6_enterprise_project_portfolio_managementMatch8.4

Social References

More

9.1 High

AI Score

Confidence

High

6.4 Medium

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:P/A:N

0.055 Low

EPSS

Percentile

93.2%